![[Pwnable] ELF Segment Sections 빠르게 구하기 (.init_array, .fini_array, .dynamic, .got, .data)](http://i1.daumcdn.net/thumb/C120x120/?fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdna%2Fbs2cXH%2FbtsH5MsuSBV%2FAAAAAAAAAAAAAAAAAAAAAIDAheTddV3qNYh6u6pYmYpMgEF_0eQ1r79551jZf203%2Fimg.png%3Fcredential%3DyqXZFxpELC7KVnFOS48ylbz2pIh7yKj8%26expires%3D1753973999%26allow_ip%3D%26allow_referer%3D%26signature%3DN6vQIakZlcQuDd5J4wnST6uzaHM%253D)
[Pwnable] ELF Segment Sections 빠르게 구하기 (.init_array, .fini_array, .dynamic, .got, .data)
아주 많은 방법이 있지만 간단하고 빠른 포너블을 위해 편한거로 작성합니다. NO-PIE일 경우 : objdump -h {binary}더보기 objdump -h binarymain: file format elf64-x86-64Sections:Idx Name Size VMA LMA File off Algn 0 .interp 0000001c 00000000000002e0 00000000000002e0 000002e0 2**0 CONTENTS, ALLOC, LOAD, READONLY, DATA 1 .note.gnu.property 00000030 0000000000000300..
- Computer Security/System Hacking
- · 2024. 6. 20.

GCC 보호기법 해제
보호기법 완전 제거(ASLR 제외)64비트gcc -no-pie -fno-stack-protector -z norelro -z execstack -fno-builtin 32비트 gcc -m32 -no-pie -fno-stack-protector -z norelro -z execstack -fno-builtin -mpreferred-stack-boundary=2 ASLR 제거echo 0 > /proc/sys/kernel/randomize_va_spacerandomize_va_space = 0ASLR 제거randomize_va_space = 1스택, 라이브러리 랜덤randomize_va_space = 2스택, 라이브러리, 힙 랜덤ulimit -s unlimited일시적 ASLR 해제보호기법Canary-fno-..
- Computer Security/System Hacking
- · 2024. 6. 1.